Thoughts on Offensive and Defensive Cybersecurity

Since 2012, the proliferation of ransomware has expanded rapidly across the globe, effecting organizations in private and public sectors. While ransomware has impacted computer systems with amplitude comparable to more typical kinds of infections, it possesses a more unique purpose than conventional malware attacks. Instead of directly exfiltrating sensitive data or destroying information like […]

Abstract I will use BeEF (Browser Exploitation Framework) in Kali Linux to demonstrate a pen test against Mozilla’s Firefox browser in a Windows XP VM. With BeEF, I will hook the target browser and illustrate how XSS (cross site scripting) allows an attacker to fingerprint the specifications of a target host. Furthermore, I will show […]

One technique we could use to prevent phishing attacks is a side channel of communication. For example, by calling the individual who supposedly sent out a suspect email, a user can verify whether the email is authentic or not. We could also verify the authenticity of an email by using a trusted address to email […]

Abstract: I will use Kali Linux to demonstrate the basics of the Linux operating system. By using the Kali Linux command line, I will explore the Linux file system to shed light on the file structure. Furthermore, I will execute basic Linux commands and illustrate fundamental file permissions. Materials – Windows 10 64x – At […]

Abstract I will gather the appropriate tools to set up a virtual lab. Afterward, I will use the virtual lab to demonstrate the utility of NMAP. The NMAP demonstration will include network scanning and port analysis. Materials – Windows 10 64x – Working internet connection – Internet browser – At least 124 MB of RAM […]

A logger was once asked, “What would you do if you had five minutes to chop down a tree?” In response, the logger said, “I would spend the first two and a half minutes sharpening my axe.” The central point of this adage is that even with limited time and resources, tasks become more effectual […]